Café (@accarmo05) 's Twitter Profile
Café

@accarmo05

ID: 189101632

calendar_today10-09-2010 11:43:18

787 Tweet

20 Followers

211 Following

Security Trybe (@securitytrybe) 's Twitter Profile Photo

Beware of QR Code SCAM❌ QR code scams have become increasingly popular among cybercriminals. By tricking you into scanning a fake QR code, they can gain access to your sensitive data, potentially resulting in financial losses.

Beware of QR Code SCAM❌

QR code scams have become increasingly popular among cybercriminals. By tricking you into scanning a fake QR code, they can gain access to your sensitive data, potentially resulting in financial losses.
Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Nmap Cheat Sheet #infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips

Nmap Cheat Sheet

#infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

SploitScan SploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability. github.com/xaitax/SploitS… #cybersecurity #infosec

SploitScan

SploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.

github.com/xaitax/SploitS…

#cybersecurity #infosec
Security Trybe (@securitytrybe) 's Twitter Profile Photo

Types of Malware -Virus -Worms -Trojan Horse -Spyware -Ransomware -Adware -Rootkit -Botnet -Logic Bomb -Polymorphic Malware -Fileless Malware

Types of Malware

-Virus
-Worms
-Trojan Horse
-Spyware
-Ransomware 
-Adware
-Rootkit
-Botnet
-Logic Bomb
-Polymorphic Malware
-Fileless Malware
Mobile Hacker (@androidmalware2) 's Twitter Profile Photo

Demo of using #BlueDucky to exploit 0-click Bluetooth vulnerability of targeted Android smartphone (CVE-2023-45866) Executed by Raspberry Pi 4 and Android running #NetHunter mobile-hacker.com/2024/03/26/blu…

Dan Nanni (@xmodulo) 's Twitter Profile Photo

As the leading cloud OS, Linux powers a variety of servers. Here is a look at some of the top open-source #Linux server software and management tools 😃👇 #sysadmin #cloudcomputing

As the leading cloud OS, Linux powers a variety of servers. Here is a look at some of the top open-source #Linux server software and management tools 😃👇 #sysadmin #cloudcomputing
Security Trybe (@securitytrybe) 's Twitter Profile Photo

FREE Labs To Test Your PenTesting/CTF Skills 1. TryHackMe - tryhackme.com 2. Vulnhub - vulnhub.com 3. RootMe - root-me.org 4. OverTheWire - overthewire.org 5. PicoCTF - picoctf.com 6. Pentestlab - pentesterslab.com 7.